Cross-domain authentication method between Kerberos and PKI safety domains based on alliance chain

An authentication method and security domain technology, applied in the technical field of authentication between the Kerberos security domain and the PKI security domain, can solve the problems of difficult management of cross-domain identity authentication, inability to share identity information, incompatibility of inter-domain authentication, etc., and achieve cross-domain authentication. Efficient domain re-authentication, improved authentication load, and good practicability

Pending Publication Date: 2022-02-11
NORTHWESTERN POLYTECHNICAL UNIV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at technical problems such as difficult management of cross-domain identity authentication, inability to share identity information between different security domains, and incompatibility of inter-domain authentication, the present invention proposes a blockchain-based cross-domain identity authentication technology to realize inter-domain identity authentication. Trust sharing to ensure the reliability, security and compatibility of cross-domain identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain authentication method between Kerberos and PKI safety domains based on alliance chain
  • Cross-domain authentication method between Kerberos and PKI safety domains based on alliance chain
  • Cross-domain authentication method between Kerberos and PKI safety domains based on alliance chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.

[0062] The invention proposes a cross-domain authentication model and method, enabling cross-domain authentication between two security domains using different encryption methods. In the application scenario of asymmetric encryption, the application system generally uses PKI to build a security framework; this technology binds the user's public key and identity together by building a trusted third-party CA c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a cross-domain authentication method between Kerberos and PKI safety domains of an alliance chain, and belongs to the technical field of computer safety. The method comprises the steps of constructing a Kerberos and PKI inter-domain identity authentication model based on an alliance chain, performing primary cross-domain identity authentication from a Kerberos safety domain to a PKI safety domain, performing primary cross-domain identity authentication from the PKI safety domain to the Kerberos safety domain, and performing cross-domain re-identity authentication from the Kerberos safety domain to the PKI safety domain. According to the method, the block chain model is used as a basis, a consensus mechanism of an alliance chain is adopted, and the entity authentication method between the PKI domain and the Kerberos domain is provided, so that cross-domain authentication certificates can be reliably stored in different safety domains in a tamper-proof manner, and cross-domain identity authentication is realized while safety and reliability are ensured.

Description

technical field [0001] The invention relates to a cross-domain authentication technology between different entities, specifically, based on the block chain technology, the authentication technology between the Kerberos security domain and the PKI security domain is realized. Background technique [0002] With the development of informatization and networking, we have entered the era of big data. As big data moves from concept to value, big data security and privacy issues have become increasingly prominent. [0003] In the Internet, the sharing and exchange of data in a distributed environment requires security guarantees, and cross-domain authentication is an important means to achieve safe sharing and exchange of big data. Blockchain technology can reduce the cost of sharing and exchanging big data in a distributed environment, and enhance data trust in sharing and exchanging. [0004] Traditional identity authentication technology generally adopts a centralized CA organ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/44G06F21/60G06F16/27G06F21/64
CPCG06F21/31G06F21/44G06F16/27G06F21/602G06F21/64
Inventor 姚烨朱怡安李联牛军涛张黎翔
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products